多項(xiàng)選擇題

Refer to the exhibit. Which two statements about the SDF Locations window of the IPS Rule wizard are true?()

A.An HTTP SDF file location can be specified by clicking the Add button.
B.If all specified SDF locations fail to load, the signature file that is named default.sdf will be loaded.
C.The Autosave feature automatically saves the SDF alarms if the router crashes.
D.The Autosave feature is automatically enabled for the default built-in signature file.
E.The name of the built-in signature file is default.sdf.
F.The Use Built-In Signatures (as backup) check box is selected by default.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit.

What does the "26" in the first two hop outputs indicate?()

A.the outer label used to determine the next hop
B.the IPv4 label for the destination network
C.the IPv4 label for the forwarding router
D.the IPv4 label for the destination router

2.單項(xiàng)選擇題Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()

A.Pings are allowed only to specific devices.
B.CDP information is not exchanged.
C.Port scans can no longer be run.
D.Some network diagnostic data is lost.
E.Wireless devices need to be physically connected to the edge device.
F.OSPF routing needs the command ip ospf network non-broadcast enabled.

3.多項(xiàng)選擇題Which three MPLS statements are true?()

A.Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B.Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C.MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D.OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E.The control plane is responsible for forwarding packets.
F.The two major components of MPLS include the control plane and the data plane.

4.單項(xiàng)選擇題

Refer to the exhibit. 

Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()

A.A→D→C→G→E→F→B
B.A→D→E→G→C→F→B
C.C→D→F→G→E→A→B
D.C→D→F→G→A→E→B
E.F→D→C→G→A→E→B


5.多項(xiàng)選擇題Which two statements about the Cisco AutoSecure feature are true?()

A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

6.多項(xiàng)選擇題

Refer to the exhibit.

What are the two options that are used to provide High Availability IPsec?()

A.RRI
B.IPsec Backup Peerings 
C.Dynamic Crypto Ma
D.HSRP
E.IPsec Stateful Switchover (SSO)
F.Dual Router Mode (DRM) IPsec


7.多項(xiàng)選擇題Which three statements about the Cisco Easy VPN feature are true?()

A.If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.
B.The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.
C.The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.
D.The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.
E.The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.
F.When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

8.多項(xiàng)選擇題What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()

A.reset the connection
B.forward the packet
C.check the packet against an ACL
D.drop the packet

9.多項(xiàng)選擇題Which three categories of signatures can a Cisco IPS microengine identify?()

A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures

10.多項(xiàng)選擇題What are two steps that must be taken when mitigating a worm attack?()

A.Inoculate systems by applying update patches. 
B.Limit traffic rate. 
C.Apply authentication. 
D.Quarantine infected machines. 
E.Enable anti-spoof measures.

最新試題

Which two statements about the Cisco AutoSecure feature are true?()

題型:多項(xiàng)選擇題

What are the four fields in an MPLS label?()

題型:多項(xiàng)選擇題

Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()

題型:多項(xiàng)選擇題

What are three features of the Cisco IOS Firewall feature set?()

題型:多項(xiàng)選擇題

What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()

題型:多項(xiàng)選擇題

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

題型:?jiǎn)雾?xiàng)選擇題

If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()

題型:多項(xiàng)選擇題

Which three techniques should be used to secure management protocols?()

題型:多項(xiàng)選擇題

Refer to the exhibit. What type of security solution will be provided for the inside network?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements about IOS Firewall configurations are true?()

題型:多項(xiàng)選擇題